Searched refs:image_src (Results 1 – 4 of 4) sorted by relevance
/trusted-firmware-a-3.4.0/bl1/ |
D | bl1_fwu.c | 30 uintptr_t image_src, 35 uintptr_t image_src, 225 uintptr_t image_src, in bl1_fwu_image_copy() argument 262 if ((image_src == 0U) || (block_size == 0U) || in bl1_fwu_image_copy() 263 check_uptr_overflow(image_src, block_size - 1)) { in bl1_fwu_image_copy() 332 if (bl1_plat_mem_check(image_src, block_size, flags) != 0) { in bl1_fwu_image_copy() 353 (void)memcpy((void *) dest_addr, (const void *) image_src, block_size); in bl1_fwu_image_copy() 368 uintptr_t image_src, in bl1_fwu_image_auth() argument 412 if ((image_src == 0U) || (image_size == 0U) || in bl1_fwu_image_auth() 413 check_uptr_overflow(image_src, image_size - 1)) { in bl1_fwu_image_auth() [all …]
|
/trusted-firmware-a-3.4.0/docs/security_advisories/ |
D | security-advisory-tfv-4.rst | 78 uintptr_t image_src, 83 ``image_src`` is an SMC argument and therefore potentially controllable by an 85 sum of ``image_src`` and ``block_size`` overflowing a 32-bit type, which 100 uintptr_t image_src, 104 Similarly, if an attacker has control over the ``image_src`` or ``image_size``
|
D | security-advisory-tfv-1.rst | 79 if (bl1_plat_mem_check(image_src, block_size, flags)) { 89 memcpy((void *)base_addr, (const void *)image_src, block_size); 105 if (bl1_plat_mem_check(image_src, block_size, flags)) { 123 memcpy((void *)base_addr, (const void *)image_src, block_size);
|
/trusted-firmware-a-3.4.0/docs/getting_started/ |
D | porting-guide.rst | 1467 Argument : unsigned int image_id, uintptr_t image_src,
|